Skip to main content
Log in

Security Analysis and Improvement on Two RFID Authentication Protocols

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Several lightweight RFID authentication protocols have been proposed to settle the security and privacy problems. Nevertheless, most of these protocols are analyzed and they are not successful in their attempt to achieve the claimed security objectives. In this paper, we consider the security of two recently proposed typical RFID authentication protocols: RAPLT protocol and SRP+ protocol. RAPLT protocol is a new ultra-lightweight RFID protocol based on two new operations named \(merge\) and \(separation\). Utilizing the linear property of the \(merge\) operation, we present a passive disclosure attack on RAPLT protocol, and we can deduce the shared secrets with overwhelming probability after eavesdropping about 100 round authentication sessions. SRP+ protocol is a novel secure RFID authentication protocol conforming to the EPC C-1 G-2 standard, and we present efficient de-synchronization attack and passive disclosure attack through exhaustive search. Our disclosure attack only needs one run of the protocol, and the attack complexity is \(O(2^{16})\) evaluation of the PRNG function in off-line analysis mode. In addition, to counteract the vulnerabilities, we propose a new modified version of SRP+ protocol, denoted by \( SRP ^{++}\), conforming to the EPC C-1 G-2 standard. Our security analysis demonstrates that \( SRP ^{++}\) protocol can resist the exhaustive search attack with the complexity \(O(2^{32})\), which is the optimal security bound.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Peris-Lopez, P., Hernandez-Castro, J. C., Tapiador, J. M., & Ribagorda, A. (2006). LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags. In Workshop on RFID security 2006. Austria.

  2. Peris-Lopez, P., Hernandez-Castro, J. C., Tapiador, J. M., & Ribagorda, A. (2006). M2AP: A minimalist mutual-authentication protocol for low cost RFID tags. In Proceedings of 2006 international conference on ubiquitous intelligence and computing (pp. 912–923).

  3. Li, T., & Wang, G. (2007). Security analysis of two ultra-lightweight RFID authentication protocols. In Proceedings of 2007 IFIP RC-11 international information security conference (pp. 109–120).

  4. Chien, H.-Y. (2007). SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Transactions on Dependable and Secure Computing, 4(4), 337–340.

    Article  MathSciNet  Google Scholar 

  5. Avoine, G., Carpent, X., & Martin, B. (2010). Strong authentication and strong integrity (SASI) is not that strong. In Workshop on RFID security—RFIDSec’10, volume 6370 of Lecture Notes in Computer Science (pp. 50–64).

  6. Sun, H. M., Ting, W. C., & Wang, K. H. (2011). On the security of Chiens ultralightweight RFID authentication protocol. IEEE Transactions on Dependable and Secure Computing, 8(2), 315–317.

    Article  Google Scholar 

  7. Phan, R. C.-W. (2009). Cryptanalysis of a new ultralightweight RFID authentication protocolSASI. IEEE Transactions on Dependable and Secure Computing, 6(4), 316–320.

    Article  Google Scholar 

  8. Wang, S. H., Han, Z., Liu, S., & Chen, D. (2014). Security analysis of two lightweight RFID authentication protocols. Annals of Telecommunications, 69, 273–282.

  9. Peris-Lopez, P., Hernandez-Castro, J. C., Tapiador, J. M., & Ribagorda, A. (2009). Advances in ultralightweight cryptography for low-cost RFID tags: Gossamer protocol. In Information security applications, Volume 5379 of Lecture Notes in Computer Science (pp. 56–68).

  10. Tagra, D., Rahman, M., & Sampalli, S. (2010). Technique for preventing DoS attacks on RFID systems. In 18th international conference on software telecommunications and computer networks—SoftCOM’10, IEEE Computer Society (pp. 6–10).

  11. Jeon, I. S., & Yoon, E. J. (2013). A new ultra-lightweight RFID authentication protocol using merge and separation operations. International Journal of Mathematical Analysis, 7(52), 2583–2593.

    Google Scholar 

  12. Class-1 generation 2 UHF air interface protocol standard version 1.2.0, Gen2 (2008). http://www.epcglobalinc.org/standards/.

  13. EPC Tag data standar dversion 1.4.2008. http://www.epcglobalinc.org/standards/. Yearly report on algorithms and keysizes. Technical report D.SPA.13Rev. 1.0, ICT-2007-216676, In Gen2. ECRYPT (2010).

  14. Bailey, D. V., & Juels, A. (2006). Shoehorning security into the EPC tag standard. In Security and cryptography for networks. 5th international conference, SCN 2006, volume 4116 of Lecture notes in computer science (pp. 303–320).

  15. Burmester, M., de Medeiros, B., Munilla, J., & Peinado, A. (2009). Secure EPC gen2 compliant radio frequency identification. In Ad-Hoc, mobile and wireless networks. 8th international conference, ADHOC-NOW2009, volume 5793 of Lecture notes in computer science (pp. 227–240).

  16. Chen, C.-L., & Deng, Y.-Y. (2009). Conformation of EPC class 1 generation 2 standards RFID system with mutual authentication and privacy protection. Engineering Applications of Artificial Intelligence, 22(8), 1284–1291.

    Article  MathSciNet  Google Scholar 

  17. Choi, E. Y., Lee, D. H., & Lim, J. I. (2009). Anti-cloning protocol suitable to EPCglobal class-1 generation-2 RFID systems. Computer Standards & Interfaces, 31(6), 1124–1130.

    Article  Google Scholar 

  18. Kim, J. G., Shin, W. J., & Yoo, J. H. (2007). Performance analysis of EPC class-1 generation-2 RFID anti-collision protocol. In O. Gervasi & M. L. Gavrilova (Eds.), ICCSA (3), volume 4707 of Lecture notes in computer science (pp. 1017–1026). Berlin: Springer.

  19. Peris-Lopez, P., Hernandez-Castro, J. C., Tapiador, J. E., & van der Lubbe, J. C. A. (2011). Cryptanalysis of an EPC class-1 generation-2 standard compliant authentication protocol. Engineering Applications of Artificial Intelligence, 24(6), 1061–1069.

    Article  Google Scholar 

  20. Peris-Lopez, P., Li, T., & Hernandez-Castro, J. C. (2010). Lightweight props on the weak security of EPC class-1 generation-2 standard. IEICE Transactions, 93–D(3), 518–527.

    Google Scholar 

  21. Yeh, K.-H., & Lo, N.-W. (2009). Improvement of an EPC gen2 compliant RFID authentication protocol. In IAS (pp. 532–535). IEEE Computer Society.

  22. Yoon, E.-J. (2012). Improvement of the securing RFID systems conforming to EPC class 1 generation 2 standard. Expert Systems with Applications, 32(1), 1589–1594.

    Article  Google Scholar 

  23. Habibi, M. H., Gardeshi, M., & Alaghband, M. R. (2011). Practical attacks on a RFID authentication protocol conforming to EPC C-1 G-2 Standard. International Journal of UbiComp (IJU), 2(1), 1–13.

    Article  Google Scholar 

  24. Masoumeh, S., Nasour, B., & Majid, N. (2013). Strengthening the security of EPC C-1 G-2 RFID standard. Wireless Personal Communications, 72(2), 1295–1308.

    Article  Google Scholar 

  25. Pang, L. J., He, L., Pei, Q., & Wang, Y. (2013). Secure and efficient mutual authentication protocol for RFID conforming to the EPC C-1 G-2 Standard. In 2013 IEEE wireless communications and networking conference (WCNC): NETWORKS (pp. 1870–1875). IEEE Computer Society.

  26. Yeh, T. C., Wang, Y. J., Kuo, T. C., & Wang, S. S. (2010). Securing RFID systems conforming to EPC class-1 generation-2 standard. Expert Systems with Applications, 37(12), 7678–7683.

    Article  Google Scholar 

Download references

Acknowledgments

This work is supported by the Priority Academic Program Development of Jiangsu Higher Education Institutions(PAPD) and National Natural Science Foundation (NSF) of China (Grant Nos. 61373006, 61302158, 61373139).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shaohui Wang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, S., Liu, S. & Chen, D. Security Analysis and Improvement on Two RFID Authentication Protocols. Wireless Pers Commun 82, 21–33 (2015). https://doi.org/10.1007/s11277-014-2189-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-014-2189-x

Keywords

Navigation